Bun0xd Profile
Bun0xd

@bun0xd

Followers
290
Following
2K
Media
45
Statuses
2K

Interwebz
Joined April 2018
Don't wanna be here? Send us removal request.
@0xor0ne
0xor0ne
1 month
My curated awesome list of cybersecurity research, RE material, exploitation write-ups, and tools. https://t.co/6YgCLKcdUH #infosec
5
181
1K
@CyberWarship
Florian Hansemann
1 month
''Malware development trick 53: steal data via legit XBOX API. Simple C example.'' #infosec #pentest #redteam #blueteam https://t.co/eHB5l9cFQe
Tweet card summary image
cocomelonc.github.io
๏ทฝ
2
24
104
@hackerschoice
The Hacker's Choice (@[email protected])
2 months
THC Release: ๐ŸŽ„Smallest SSHD backdoor๐ŸŽ„ - Does not add any new file - Survives apt-update - Does not use PAM or authorized_keys Just SSHD trickery....adds one line only. More at https://t.co/zVCLwmbXv2 ๐Ÿ‘Œ
5
110
521
@MsftSecIntel
Microsoft Threat Intelligence
4 months
In early October 2025, Microsoft disrupted a Vanilla Tempest campaign by revoking over 200 certificates that the threat actor had fraudulently signed and used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware. We identified this
5
52
145
@SpecterOps
SpecterOps
4 months
Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code.
specterops.io
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
1
115
284
@horizon_secured
Horizon Secured
4 months
๐Ÿ”’ Secure Bits ๐Ÿ’ก Did you know ๐˜†๐—ผ๐˜‚ ๐—ฐ๐—ฎ๐—ป ๐—ต๐—ถ๐—ฑ๐—ฒ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป๐˜€ from standard discoveryโ€”even from other admins? Active Directory is a โ€œ๐—ฟ๐—ฒ๐—ฎ๐—ฑ-๐—บ๐—ฎ๐—ป๐˜†โ€ ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† by design. But ๐—Ÿ๐—ถ๐˜€๐˜ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜ ๐— ๐—ผ๐—ฑ๐—ฒ (๐—Ÿ๐—ข๐— ) can change that. ๐Ÿ•ต๏ธโ€โ™‚๏ธ Martin Handl
2
71
374
@techspence
spencer
4 months
Active Directory hardening is freeโ€ฆoutside of your time. Overall - PingCastle Passwords - FGPP, LAPS, Lithnet Permissions - ADeleg/ADeleginator Applocker - Applocker Inspector/Applocker gen ADCS - Locksmith Logon scripts - ScriptSentry GPO - GPOZaurr Baselines - CIS/Microsoft
27
176
1K
@fr0gger_
Thomas Roccia ๐Ÿค˜
5 months
Great resource by @lazarusholic listing DPRK linked threat actors and related threat reports ๐Ÿ‘Œ https://t.co/cSSunBa5bo
4
52
254
@_Mayyhem
Chris Thompson
6 months
I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - https://t.co/Hh089SaVOS - https://t.co/geO0HXTykf
6
215
631
@SpecterOps
SpecterOps
7 months
๐Ÿ”ด Red and blue teams, this one's for you. ๐Ÿ”ต LudusHound bridges BloodHound Attack Paths with lab automation by creating a functional Active Directory replica testing environment. Read @bagelByt3s blog post for more. https://t.co/YOGMEQ8upC
6
79
221
@0xacb
Andrรฉ Baptista
7 months
A cool recon trick to find more targets is to check out CSP policies for juicy assets. csprecon can do this for you ๐Ÿ‘‰ https://t.co/FRWS3ImxPF
0
46
209
@albinowax
James Kettle
7 months
Google docs now supports export as markdown! This was probably done for LLM's benefit, but it's perfect for regexing into clean, minimalist HTML:
2
13
126
@5mukx
Smukx.E
7 months
DLL Side-loading and Hijacking โ€” Using Threat Intelligence to Weaponize R and D https://t.co/yJOHmqfWLI
1
35
172
@elasticseclabs
Elastic Security Labs
7 months
New research from our #ElasticSecurityLabs team: we dive into how infostealers are leveraging a stolen Shellter evasion tool to deploy data-stealing malware. Learn more & get our unpacker: https://t.co/7IvybAvyuL #malware #rhadamanthys #ghostpulse
Tweet card summary image
elastic.co
Elastic Security Labs detected the recent emergence of infostealers using an illicitly acquired version of the commercial evasion framework, SHELLTER, to deploy post-exploitation payloads.
2
51
145
@G0ldenGunSec
Dave Cossa
7 months
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
Tweet card summary image
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
7
83
189
@al3x_n3ff
Alex Neff
7 months
How to find the Entra ID sync server - A new NetExec module๐Ÿ”Ž Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server๐Ÿš€
9
138
497
@SEKTOR7net
SEKTOR7 Institute
7 months
Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer. A technique developed by Peter
2
84
292
@mistymntncop
j j
7 months
Mini Writeup of CVE-2025-6554. POC by @DarkNavyOrg. All errors in writeup my own. https://t.co/tvzW9t76O5
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
4
34
155
@cyb3rops
Florian Roth โšก๏ธ
7 months
I built a defensive scanner. They used it for privilege escalation. Somewhere, a red teamer is smiling. ๐Ÿ˜„ https://t.co/QchUrBMaha
9
36
257
@ShitSecure
S3cur3Th1sSh1t
7 months
Including nice tool release ๐Ÿ”ฅ https://t.co/4v2osVGTfA
Tweet card summary image
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
@ShitSecure
S3cur3Th1sSh1t
7 months
Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 ๐Ÿ‘€๐Ÿ‘Œ
1
73
195